CyberAlerts is shutting down on June 30th, 2025. Thank you for your support!

CVE-2025-1536: Raisecom Multi-Service Intelligent Gateway Request Parameter vpn_template_style.php os command injection

6.9 CVSS

Description

A vulnerability was found in Raisecom Multi-Service Intelligent Gateway up to 20250208. It has been declared as critical. This vulnerability affects unknown code of the file /vpn/vpn_template_style.php of the component Request Parameter Handler. The manipulation of the argument stylenum leads to os command injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way. In Raisecom Multi-Service Intelligent Gateway bis 20250208 wurde eine Schwachstelle ausgemacht. Sie wurde als kritisch eingestuft. Das betrifft eine unbekannte Funktionalität der Datei /vpn/vpn_template_style.php der Komponente Request Parameter Handler. Durch Manipulation des Arguments stylenum mit unbekannten Daten kann eine os command injection-Schwachstelle ausgenutzt werden. Der Angriff kann über das Netzwerk angegangen werden. Der Exploit steht zur öffentlichen Verfügung.

Classification

CVE ID: CVE-2025-1536

CVSS Base Severity: MEDIUM

CVSS Base Score: 6.9

CVSS Vector: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N

Problem Types

OS Command Injection Command Injection

Affected Products

Vendor: Raisecom

Product: Multi-Service Intelligent Gateway

Exploit Prediction Scoring System (EPSS)

EPSS Score: 7.3% (probability of being exploited)

EPSS Percentile: 90.92% (scored less or equal to compared to others)

EPSS Date: 2025-03-22 (when was this score calculated)

References

https://nvd.nist.gov/vuln/detail/CVE-2025-1536
https://vuldb.com/?id.296476
https://vuldb.com/?ctiid.296476
https://vuldb.com/?submit.497021
https://github.com/koishi0x01/CVE/blob/main/CVE_1.md

Timeline